Network Infrastructure

Network infrastructure professionals understand that a reliable and secure infrastructure is crucial to enabling business execution. Join the network infrastructure community to interact with thousands of IT professionals. Browse hundreds of on-demand and live webinars and videos to learn about the latest trends in network computing, SDN, WAN optimization and more.

Today, the vast majority of organizations struggle to manage complex application environments consisting of a growing portfolio of SaaS applications as well as commercial off-the-shelf and custom web apps hosted on-premises, at remote data centers, and in private clouds. Organizations are further challenged to manage access to applications, networks, and devices for users stored in disparate directories.

The Future of Access Management is here. Join 451 Research’s Sr. Analyst Garrett Bekker, OneLogin’s CMO Miles Kelly and Director of Product Gary Gwin as they unveil a new way to unify access to both SaaS and on-premises applications, as well as access to networks and devices, all with a single Identity-as-a-Service (IDaaS) solution.

As the ‘public profile’ of cybercrime continues to increase, enterprises are encouraged to look at how they keep their businesses and customers safe by sharing intelligence, best practice and defense measures.

Join Nahim Fazal, Head of Cyberthreat Intelligence at Blueliv, for a webinar reflecting on the incidents and trends discussed in Blueliv’s annual cyberthreat report, and guidance on how organizations of all sizes can protect themselves in an ever-more sophisticated threat landscape.

The report combines intelligence gathered through Threat Compass with insight from the Blueliv analyst team, leading to informed assessments about the current state of play and areas which require immediate attention.

Register today to reserve your spot.

Blueliv is leading a new wave of proactive, real-time threat monitoring that protects organizations from the outside in, radically reducing attack success rates and improving incident response performance through fresh, actionable intelligence. The in-house team is bolstered by the Blueliv Threat Exchange Network, a global community of thousands of security experts united in the fight against cybercrime.

With the ubiquity of cloud computing and enterprises embracing digital transformation, application development is at its peak of intensity. Line of Business (LoB) application developers are at the forefront of this application transformation from monolithic architectures to microservices.

In this webinar, you will learn:
• Key application delivery requirements for the LoB developer and Devops teams
• Common use cases and scenarios
• How Citrix can help your IT team provide an IT managed cost-effective application delivery service to your developers

Artificial Intelligence and Machine Learning are impressive but not yet able to completely replace security professionals. So, what is the right solution for you and your organization?

In this webinar, we will demonstrate the shortcomings of using both technologies, without a security professional in the loop, and make the case that coupling the experience and intuition of a security professional with a machine learning system, can greatly improve the overall results.

We will also tap the insights of Arctic Wolf Networks's Chief Architect, Matthew Thurston, on how Hybrid-AI and Machine Learning can improve threat detection capabilities and reduce false positives.

After attending, you will be able to:

- Recognize how AI and Machine Learning are typically used in Cyber Security, and what are the gaps
- Define what is Hybrid-AI, why it improves detection accuracy and reduce false positives
- Understand how Arctic Wolf Networks uses human augmented machine learning to detect Ransomware attacks

About our guest speaker:

Matthew Thurston developed his technical vision and security industry experience working over 10 years at Blue Coat Systems as a key developer of the policy enforcement system. He was a co-inventor on patents covering network policy management and optimizing MS Exchange (MAPI) traffic. His work reverse engineering the MAPI protocol gave birth to his keen interest in all things packet-related. Prior to Blue Coat, Matthew cut his teeth as a developer working on a wide range of projects including laser projection systems at Virtek Vision, ergonomic automation at HumanCAD Systems and configuration management software at MKS. Matthew is a graduate of the University of Guelph with a bachelor of science in computer science.

Open source Prometheus is designed to help you monitor the performance and health of containers and application stacks in microservices deployments. It provides a wealth of metrics exposed via Prometheus endpoints for a wide range of applications and infrastructure components. Applications developers love Prometheus as it helps them see how their code behaves – especially as things move from development into production. Operations teams benefit as well by gaining insight into system performance and identifying anomalies during runtime.

If you’re just getting started with containers or Prometheus, or if you’re looking for ways to optimize an existing deployment, join us to learn how Prometheus metrics can be best utilized for monitoring container-based microservices environments.

In this webinar we’ll discuss and demo:

-Methods for instrumenting your environment to collect and use -Prometheus metrics and time-series data for visibility into your application infrastructure
-Correlating Prometheus and other metric types with like Kubernetes orchestration metadata to monitor service-oriented environments
-How to build effective dashboards for keeping watch over critical systems and information running in development and production
-Using Prometheus metrics to detect, alert, troubleshoot and resolve common scenarios you will face in your container-based cloud

Leveraging state of the art technology to help you find personal data, spot risky users, and respond to incidents

The General Data Protection Regulation (GDPR) sets a new standard in data protection that will impact not just EU, but global organizations. With the GDPR start date quickly approaching, organizations face plural priorities; how to stay on top of their existing security program, while building – and implementing - a compliance strategy by May 2018.

The keys to success? First, ensuring you understand the data protection risks you face. Second, using state of the art technology to both reduce risk and free up your security team.

Join us on March 15th to learn how to leverage state of the art technology to build an efficient data protection risk management strategy.

During this session, you will learn:

-Why good risk management and data-centric protection go hand in hand

-How leading technology helps you discover, monitor and protect personal data, wherever it is

Schools today require not only better education for tomorrow's leaders and cost-saving efficiencies, but always-on connectivity from their network solutions. This is becoming apparent as modern instructional practices have evolved with digital advancements such as digital textbooks, flipped classrooms, online testing, and cloud-based tools designed to enhance teaching methods.

With these changes comes the need to find affordable, easy to manage solutions for applications such as school bus WiFi, physical security, digital signage, network resiliency, and a myriad of other applications to help schools meet the changing needs of students, teachers, and the community.

Join Ed Walton, VP of the North Central, and Roger Billings, Global Solutions Architect at Cradlepoint, for a live webinar on March 15th, 2018, at 9:00 am PT and learn more about solutions for optimizing network connectivity for K-12 education.

A “real” migration into the Hybrid Cloud (HCM, PlateSpin, and Cloud Assess)

The Hybrid cloud has either been a unicorn (something beautiful but not real) or a boogey man (something to prevent disruption) in our ecosystem for the last several years. In marketing and static architectures, we have seen a lot of promises, but very little actual progress.

Hybrid Cloud is becoming more important everyday as nearly all companies are in (or will be in) the public cloud but many of these same companies ‘know’ that they cannot be 100% public. So, the problem we are all trying to solve is how can we provide all the features, functions and automations.
What will be covered:

Vivit launches its first ever IT Operation Management (ITOM) SIG Talk event. We have 3 speakers who will give you insights in the ITSMA Containers Concept and migration into the Hybrid Cloud. They will share their knowledge and expertise and provide thought-provoking and actionable content.

Shown below is an outline of the agenda and topics:

•Speaker: Eric Krueger
Everything you need to know about the Micro Focus ITSMA Containers Concept: Containers are here and they are the best way to deploy, maintain and upgrade software. What are containers? How are they deployed? How is the software different on containers than traditional platforms? Why did HPE/Micro Focus decide on a containerization approach to their ITSM suite? Tune in and find out why containers are the deployment method of the future and how to transition your existing ITSM suite from your Linux or Windows environment to a Containerized environment.

•Speakers: David Angradi
A “real” migration into the Hybrid Cloud (HCM, PlateSpin, and Cloud Assess): The Hybrid cloud has either been a unicorn (something beautiful but not real) or a boogey man (something to prevent disruption) in our ecosystem for the last several years. In marketing and static architectures, we have seen a lot of promises, but very little actual progress.

Hybrid Cloud is becoming more important everyday as nearly all companies are in (or will be in) the public cloud but many of these same companies ‘know’ that they cannot be 100% public. So, the problem we are all trying to solve is how can we provide all the features, functions and automations.

One certainty in the emerging microservices ecosystem is Kubernetes. Originally created by Google, and subsequently donated to the Cloud Native Computing Foundation (CNCF), Kubernetes has become the leader in container orchestration.

In this webinar we will discuss how you can get started with the NGINX and NGINX Plus Kubernetes Ingress controllers, which are used to load balance, route traffic to, and secure applications on Kubernetes. The controllers support advanced Layer 7 features, such as authentication. Using the Ingress resource, the configuration of NGINX is managed by Kubernetes, making operations simpler and more streamlined.

- The benefits of using Kubernetes and why it's become the de facto container scheduler
- About the Kubernetes Ingress resource and Ingress controllers
- How to use NGINX and NGINX Plus Ingress controllers to load balance, route traffic to, and secure applications on Kubernetes
- How to monitor the NGINX Plus Ingress controller with Prometheus

Beyond prototypes, organizations looking to put Deep Learning into production need AI infrastructures than can reliably keep pace with the speed of their businesses. Distributed Deep Learning extends training across multiple nodes, thereby enabling implementations with considerably more scale and performance than was possible with a single node.This session will explore Distributed Deep Learning concepts, with an emphasis on how these concepts can be applied to solve real-world problems.

By attending this webinar, you'll learn about:

• Introduction to Distributed Deep Learning – We’ll kick off the session with an overview of what distributed Deep Learning is and why it matters.
• Distributed Approaches - We'll compare various approaches to distributed training: model- and data parallelism, parameter servers, asynchronous and synchronous training, and graph replication approaches.
• Performance Breakthroughs – We’ll explore the unprecedented Deep Learning performance gains that are possible, by combining POWER8 with NVLink, along with the NVIDIA P100 GPU and the latest Distributed TensorFlow builds.

With the ubiquity of cloud computing and enterprises embracing digital transformation, application development is at its peak of intensity. Line of Business (LoB) application developers are at the forefront of this application transformation from monolithic architectures to microservices.

In this webinar, you will learn:
• Key application delivery requirements for the LoB developer and Devops teams
• Common use cases and scenarios
• How Citrix can help your IT team provide an IT managed cost-effective application delivery service to your developers

Organizations are increasingly adopting Office 365 as part of the “move to the cloud” endeavor. Many organizations are also evaluating a cloud-based email security solution to close security gaps and mitigate risks from migration to the cloud.

Recent trends suggest a continued increase in popularity of ATM “jackpotting” operations leveraging various tactics, techniques and procedures (TTPs). While we have observed an increase in the use of ATM malware in underground communities since 2011, highly publicized events demonstrating the potential for lucrative profits from ATM jackpotting operations have undoubtedly sparked more interest in this attack vector. Join this webinar to learn about the marketplace dynamics enabling ATM jackpotting, common TTPs used by criminals, and what organizations can do to mitigate risk associated with these operations.

Transactions are migrating from offline to online channels, driving dramatic shifts in the fraud landscape. 2018 will be another challenging year as increasing EMV penetration in the US further throttles the counterfeiting market, shifting more fraudulent activity into digital channels. Join 451 Research Principal Analyst Jordan McKee as he discusses the major fraud trends to monitor in the New Year and shares market data on the current and future state of the digital commerce threat environment.

How much time and missed opportunity is yesterday's network design costing today’s organisation? For many, cloud has already disrupted their software, communications and storage to scale and simplify operations – so why not networks?

Join our CWNEs for this 30 minute workshop o review the benefits of today’s cloud networking offerings – and how to apply principles of software defined networking for radical simplification of the local and wide area network.

Threats in today’s cyber landscape are becoming increasingly sophisticated. To successfully fend off attacks, organizations need security tools that work effectively and efficiently across vendors; however, it is not uncommon for one vendor’s products to not work with others, despite claiming support for standards. In this webinar, we will introduce some of the key challenges a heterogeneous integrated security environment must solve and how STIX/TAXII2 standards-based technologies support solving those challenges in a new and effective manner.

Security operations need to balance a drive for greater efficiency with the need for agile and adaptive investigations. The security workflow paradigm of the last decade focused heavily on detection and alerting. Once a potential security problem is detected, the rest of the investigation and remediation process is essentially manual. Given the sheer volume of alerts and high ratio of false positives, this workflow is no longer sustainable. In this webinar, we'll discuss the parts of the current security paradigm that cause the most time waste, and introduce a new automated 3-in-1 workflow, enabled by ExtraHop Reveal(x), that can reduce wasted time and accelerate investigations for enterprise security teams:

You'll learn:

- Three top causes of time-waste in the SOC, and how to avoid them
- How to focus manual effort on tasks that matter, and automate the rest
- How the Reveal(x) 3-in-1 workflow meshes discovery, correlation, and investigation to reduce false positives and manual labor, and accelerate security investigations.

Two speakers will share their "Tips & Tricks" insights on implementation on an effective test automation framework in DevOps and dos and don'ts with Unified Function Testing (UFT) and Lean Functional Testing (LeanFT). They will share their knowledge and expertise and provide thought-provoking and actionable content.

Shown below is an outline of the agenda and topics:

•Speaker: Bob Crews
Seven Tips to Implement an Effective Test Automation Framework in DevOps: This presentation will provide seven strategic, proven tips to more effectively design and implement a robust test automation framework in an Agile and DevOps environment. A brief overview of the critical components and characteristics of an effective framework will be presented followed by the key value and benefits, essential for justification to leadership.

•Speaker: Carsten Neise
Dos and Don'ts with Micro Focus UFT and LeanFT: Carsten will demonstrate what bottlenecks you may fall into daily from installing Micro Focus UFT up to usage. Additionally, he will show some differences in using Micro Focus LeanFT and UFT.

Join us for the next upcoming SIG Talk on Tuesday, April 17, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1083510&group=.

This presentation will provide seven strategic, proven tips to more effectively design and implement a robust test automation framework in an Agile and DevOps environment. A brief overview of the critical components and characteristics of an effective framework will be presented followed by the key value and benefits, essential for justification to leadership.

Join us for the next upcoming SIG Talk on Tuesday, April 17, 2018: http://www.vivit-worldwide.org/events/EventDetails.aspx?id=1083510&group=.

In the age of Digital Transformation, SD-WAN is on the lips of all enterprises and service providers. While the operational and commercial benefits of SD-WAN are clear, the focus on these as THE consideration is dangerous, as along its benefits comes a greater cyber security risk.

This session will focus on Secure SD-WAN and the built-in benefits it provides, from both the operational and security points of view.

Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.

Join this panel of experts as they discuss:
- The biggest trends in cyber crime
- Impact of Cryptocurrencies
- Breaches and preventing future fraud and cyber attacks
- Advancements in security technology
- Why security awareness training should be a key part of your overall data protection strategy

Are you concerned about loss of control and visibility as you move applications and workloads to the cloud?

NetScaler Management and Analytics (NetScaler MAS) provides application level visibility, management and automation of your application delivery environment across multiple clouds. NetScaler MAS is available as a Citrix cloud service or can be deployed as software in your data center.

Join this webinar and learn how to:

• Harness and use data about users, apps, and traffic from any NetScaler or HAproxy
• Automate and manage your entire application delivery infrastructure from one console
• Deploy and map applications to infrastructure using stylebooks so that you can easily manage your app’s lifecycle
• Ensure policies are consistently applied by automating provisioning, configuration and SSL certificate management across your environment
• And more!

As demand for mobile connectivity continues to grow for today’s in-building business operations and high-density venues, traditional small cells and distributed antenna systems often fall short in oﬀering the right solution. With the emergence of network function virtualization (NFV) on the edge, an entirely new method for in-building mobile connectivity is possible that fundamentally changes both deployment and economic models. This session will share how using an all software solution with off-the-shelf Intel processing platforms delivers a complete, scalable, and elastic cell system for mobile, public safety and IoT coverage and capacity ready for the 5G future

Healthcare is strictly regulated and fraught with laws that seek to protect the patient as well as the healthcare provider. In today's modern world, technology plays a huge part in the ability to serve patients but must be able to consistently adhere to current industry regulations and flexible enough to accommodate its evolution.

In this webinar, VeloCloud takes a look at how SD-WAN plays a key role in ensuring that providers are able to deliver care through:

If you have a data center or application migration on the horizon, you need to be aware of the pitfalls. Out-of-date CMDBs, reliance on tribal knowledge, lack of performance reporting, and other gotchas can lead to project overruns and application performance issues.

Thankfully, you can use data pulled from the network to discover assets, map dependencies, measure before-and-after baselines, and validate your project's success.

Register for this webinar to learn more about how to overcome the common challenges in your data center migration project.

Advanced phishing attacks and ransomware continue to plague Organizations with a 55% increase according to Symantec threat research. Users continue to be easily social engineered into opening phishing emails which can steal confidential data like credentials. In addition, email continues to be the number one vector for malware including ransomware. Combating these insidious threats requires a powerful combination of advanced protection and user security awareness.

This webinar introduces email threat isolation, a paradigm shift in the fight against phishing attacks and ransomware.

With the major cyber-attacks headlining the news, many of these cyber threats fall into five different attack vectors. Whether it's user credentials, personally identifiable information (PII), payment card information, health care information, intellectual property, or another form of data, nothing is safe from these bad actors. So, how do you protect you and your business from these debilitating attacks?

In our upcoming webinar, we arm you with the essential components needed to defend your business against the top five attack vectors we see in a Cyber Security Operations Center (SOC).

After attending you will:

- Recognize what are the top 5 attack vectors and the counter-measures you can take
- Understand the importance of detection and response in the kill-chain for each attack vector
- Discover how Arctic Wolf Networks (AWN) CyberSOC works to provide the essential components to protect against each of them

Register now to understand the different ways an attacker may cause harm to you and your business and how to defend yourself moving forward.

A cloud-based DevOps environment on AWS can benefit from a security solution that is as agile as you are.

In this webinar Barracuda and AWS will show you leading-edge application security techniques for creating secure application environments, embedding security into continuous deployment, and scaling security to perfectly fit your operations. We will do a demo to show you the power of automating security on AWS.

Learn about the challenges of application security when moving to the cloud, how to secure your web, mobile, and API-based applications, and to view a demonstration of the Barracuda WAF securing an AWS application.

Harness the power of cloud and DevOps for security that leaves traditional infrastructures behind.

According to IDC, only IBM Power Systems servers are designed specifically to work with data-intensive workloads such as SAP HANA.

Organizations that have the most to gain using SAP HANA on IBM Power Systems are:

• Businesses with SAP HANA appliances due for a refresh
• Organizations on commodity architecture moving to SAP HANA
• Businesses with a traditional database and SAP applications on IBM Power Systems
• Businesses on IBM Power Systems that currently do not have SAP

This webinar featuring IDC Research Analyst Peter Rutten's details the findings and how using IBM Power Systems can reduce migration risks and broaden your options for a hybrid cloud infrastructure.

A discussion around the role and the evolution of data. We will also cover the importance of protecting data throughout its lifecycle.

We will look at:
- Fundamental changes in the way we live, work and communicate
- How we have become highly reliant on data, so it means more to us
- The increasing value of data and why we need to protect it

The potential of widely distributed IoT devices to enable new business opportunities, streamline operations, and reduce costs is vast, but so are the security implications. With IoT playing an increasingly big role at branch offices, within vehicles and in the wild, larger attack surfaces are giving IT teams more to worry about than ever before.

Well-publicized attacks such as Mirai botnets and WannaCry grabbed headlines, but they're just the tip of the iceberg. IoT threats are becoming too prevalent and advanced to address with traditional security tools. Now is the time for software-defined, policy-based security solutions that isolate IoT devices and protect organizations' most valuable data - regardless of the WAN source.

Join Cradlepoint's Ken Hosac, VP of IoT strategy and business development, and Brandon Ashey, infrastructure and security manager, for a live webinar on March 21, 2018, at 9 am PT. Learn about IoT security challenges and best practices for mitigating risk, including Software-Defined Perimeter technology that creates micro-segmented device-to-cloud overlay networks that are completely cloaked from other networks.

Enterprise networks are changing fast. Traffic volumes are growing relentlessly, applications are increasingly dynamic and distributed, and some of them have moved outside of IT’s direct control. On top of these challenges, every category of business process is moving to digital — the network is now both your supply chain and your delivery vehicle. IT and network teams are feeling more squeezed than ever as their traditional tools fall further behind these modern requirements.

--Pervasive visibility within the data center, across the WAN, and into public cloud
--Proactive alerting and anomaly detection for both NetOps and SecOps
--Single-pane-of-glass visibility across all applications regardless of where they run
--And much more for modernizing your enterprise network

There are, however, some specific parts of Docker based architectures which are more prone to attacks. In this webinar we are going to cover 7 fundamental Docker security vulnerabilities and threats.

Each section will be divided into:
-Threat description: Attack vector and why it affects containers in particular.
-Docker security best practices: What can you do to prevent this kind of security threats.
-Proof of Concept Example(s): A simple but easily reproducible exercise to get some firsthand practice.

The modern cyber war — against governments, businesses and individuals alike — is comprised of a series of attacks, counterattacks and respective defensive countermeasures. The SonicWall 2018 Cyber Threat Report provides exclusive data that highlights advances by both the security industry and cyber criminals.

Attend this webinar to gain a better understand the current State of Cyber-Security Arms Race. We’ll share our findings, intelligence, analysis and research to help you improve your security preparations and posture going forward.

Phishing, ransomware, and data breaches plague organizations of all sizes and industries, but the financial services market has always had the largest target on its back. As a mid-market financial organization, how do you fend off these attacks when you don’t have the budget for everything you need: data feeds, tools, analysis and mitigation?

The answer: “Threat Intelligence-as-a-service.” This, robust, cost-effective option, brings together dozens of structured threat intelligence feeds, online monitoring of social media and the dark web, and round-the-clock human review to give you vetted, relevant intelligence specific to your organization. Even better, there is no hardware or software to install, this is a completely managed service that can be up and running in hours or days. It finally puts “big bank” threat intelligence capabilities within the reach of smaller organizations.

Join LookingGlass’ Vice President of Customer Support James Carnall and Vice President of Intelligence Operations Eric Olson on Wednesday, March 21 @ 2pm ET as they discuss how threat intelligence can be affordable for mid-market organizations with LookingGlass’ Information Security-as-a-Service package, a new offering tailor made for your organization’s cybersecurity needs.

Now that 802.11ac Wi-Fi has established itself in the market, we’re already looking at what’s in development for the next generation of wireless communications. Will communication speeds continue on their rapid upward trend and, if so, what new applications could emerge as a result? And with 5G cellular garnering a lot of attention lately, will it make a play to obsolete Wi-Fi? Register for this webinar to learn:
-The status of 802.11ax and ay
-An overview of 5G cellular and how it will effect wireless
-How infrastructure will adapt to support these new developments

DDoS attacks can be damaging; especially for an online business that depends on valuable client relationships and reliable user experiences. But business organizations aren’t the only targets of malicious web bots. Banking institutions, governments, hospitals and schools have all suffered from debilitating attacks in the past few years.

There are still a lot of misconceptions when it comes to DDoS attacks. We take some of the most common ones and address misleading information. One thing is certain: Knowing the facts will help you keep your website safe.

Enterprise applications and business processes are enabled by ICT solutions deployed within the data centre facility, while reliable connectivity unifies all your presence across different geographies. Meanwhile, let’s not forget the increasing reliance of cloud services that helps enterprises to reduce capital expenses and increases agility. Sounds like a disparate, complex environment? Well, it is.

In this session, Ashton Soh, Associate Director of Managed Hosting in Singtel, will lend insights how Singtel’s DC.DX platform, with the data centre at the heart of it, can help enterprises mitigate the complexity and gain the right expertise for their digital transformation initiatives.

Though much is made of the potential of Deep learning, architecting and deploying a Deep Learning platform is a daunting proposition, especially when trying to leverage the latest GPUs and I/O technologies.

Discover how a Web Application Firewall (WAF) can protect your applications and infrastructure

Attackers have moved up the stack, and network firewall technology is no longer sufficient to combat the application level threats to your infrastructure and your business. This webinar, brought to you by NSS Labs and Citrix, will explore how to assess WAF solutions in terms of security effectiveness, performance, stability, reliability, and TCO.

Join this webinar to learn how Citrix WAF:

• Has the best price-performance ratio
• Provides “pay-as-you-grow” capability
• Is available on a range of appliance, in software, or as a cloud service